Terrorism and the Limits of Citizenship: Remaking Citizenship in a Time of Crisis

Total Page:16

File Type:pdf, Size:1020Kb

Terrorism and the Limits of Citizenship: Remaking Citizenship in a Time of Crisis Terrorism and the Limits of Citizenship: Remaking Citizenship in a Time of Crisis by Rick T. Kavin A Thesis submitted to the Graduate School-Newark at Rutgers, The State University of New Jersey, in partial fulfillment of the requirements for the degree of the Master of Arts in Political Science graduate program, written under the direction of Dr. Mara Sidney and approved by: ______________________________________ (Dr. Mara Sidney – Committee Chairperson) ______________________________________ (Dr. Alison Howell) ______________________________________ (Dr. Elizabeth Hull) Newark, New Jersey May, 2016 ©2016 Rick T. Kavin ALL RIGHTS RESERVED ii ABSTRACT Terrorism and the Limits of Citizenship: Remaking Citizenship in a Time of Crisis By Rick T. Kavin Thesis Advisor: Dr. Mara Sidney The goal of this project is to analyze the confluence of factors that is resulting in a changing understanding and application of citizenship in the United States. As fears of citizen terrorism rise and the government implements new policies to combat terror, there is a shift in policy taking place as well as a divergence between policy and practice. Using the story of the targeted killing of Anwar al-Awlaki, an American citizen who left the United States, joined Al Qaeda, and began advocating for the destruction of the West, I explore how these changes have led to a broader change in citizenship as a concept. By reviewing scholarly literature on citizenship, by examining American policies and practices with regard to citizenship across all three branches of government and across history, and by linking the concept of a collective American identity to citizenship, I have shown that there are several factors simultaneously facilitating continuity and change taking place in the realm of citizenship. iii ACKNOWLEDGEMENTS I would like to thank the faculty in the Political Science department at Rutgers-Newark who went above and beyond in their roles as educators and mentors. Both inside and outside the classroom, I could always count on them to teach me something worth learning. A particular thank you to Dr. Mary Segers, who took a chance by admitting me to the Master’s program and has supported me throughout. Thank you to Dr. Alison Howell and Dr. Elizabeth Hull, who sat on my thesis committee and offered invaluable advice and constructive criticism. Thank you to Ms. Beth Freda, who always went out of her way to make sure my questions were answered. And of course, a very special thank you goes to Dr. Mara Sidney, without whom this project would never have been completed. Thank you, Dr. Sidney, for your guidance, patience, and support. I truly could not have done it without you. Finally, thank you to both my mother, Kathy Kavin, and my step-father, Jack Blauvelt, who have done their best to keep me sane, happy, and fed over the past two years. Thank you for everything, and most especially for always believing in me. iv TABLE OF CONTENTS Abstract ....................................................................................................................................... iii Acknowledgements ..................................................................................................................... iv Table of Contents ......................................................................................................................... v Part I: Anwar al-Awlaki, Citizenship, and Targeted Killing ....................................................... 1 Part II: Citizenship Policy in the United States and Abroad ....................................................... 18 Part III: Identity, Belonging, and Citizenship ............................................................................. 46 Part IV: Conclusion .................................................................................................................... 71 Bibliography ................................................................................................................................ 87 v 1 Part I: Anwar al-Awlaki, Citizenship, and Targeted Killing Throughout the chapters of this thesis, I examine the biographical information of Anwar al-Awlaki, an American citizen who left the United States, joined a jihadist organization, and was killed by the American government. Using the story of the life and death of al-Awlaki as described below, it is possible to probe the current understanding of citizenship and to explore the ways that the very meaning of citizenship is changing and evolving. Al-Awlaki's history provides insight into what may be a turning point in the way the state interprets, characterizes, and protects the rights of citizens. By employing one of the most drastic measures a government can take against one of its citizens – killing him on foreign soil – the United States has indicated that it too is adhering to a different understanding of citizenship than it has traditionally. With an increase in the number of American citizens (and others with Western passports that grant them visa-free access to the United States) enlisting with terrorist organizations as foreign fighters, the seemingly unprecedented actions taken against al-Awlaki by the government of the United States may be repeated. On April 6, 2010, President Barack Obama authorized the killing of Anwar al- Awlaki, a high-ranking member of the Al Qaeda terrorist network who had spent much of his childhood in Yemen, where he held citizenship. This in itself was not unusual, as the American government, its military, and the Central Intelligence Agency have long utilized “kill lists” of terrorists approved to be targeted and killed. What was extremely unusual was that al-Awlaki was also an American citizen; he was born in New Mexico, lived in the United States for the first seven years of his life, and then returned to the U.S. for college and much of his adult life. Al-Awlaki eventually developed a so-called “radical Islamic ideology,” and he was placed on the target list in accordance with 2 international law, which as a general principle permits the use of lethal force against individuals and groups that pose an imminent threat to a country.1 He was killed in a drone strike in Yemen on September 30, 2011. For some time, the killing of an American citizen by an American attack authorized by the American government was considered unprecedented and extraordinarily unique. In fact, al-Awlaki was the first U.S. citizen added to the list of suspected terrorists the CIA is authorized to kill (Bjelopera 2013: 16). Now however, as international terrorist groups such as the Islamic State of Iraq and the Levant (known as ISIL, ISIS, or the Islamic State) specifically recruit Americans and others with Western passports, the notion of Americans as potential targets for government killing is becoming a more plausible consideration. Approval for targeted killing by the state without a trial is a clear indication that the government no longer considers that person to possess the complete rights of a citizen, and possibly none at all. Targeted killing could then be considered an informal ejection from the state, and had al-Awlaki not also held citizenship in Yemen, this would have essentially forced statelessness upon him. The ability to remove the rights of a citizen raises clear questions about the limits of one's citizenship. As hundreds of American citizens continue to “radicalize” and pledge allegiance to terrorist groups intent on harming the United States, how are the policies and practices related to terrorism changing? How has the killing of Anwar al-Awlaki impacted the role of citizenship in the United States? Most importantly, what does this 1 The threshold of an imminent threat is crossed upon satisfying the “Caroline Test,” named after an 1837 incident in which British forces attacked the steamboat Caroline, which was carrying men and supplies from the United States to Canadian rebels. When the British claimed this to be an act of self-defense, US Secretary of State Daniel Webster laid out specific criteria for self-defense concerning the necessity and proportionality of response. These were accepted by the British and came to be seen as customary international law before being recognized by the Nuremberg Tribunal. The criteria are as follows: 1) The use of force must be necessary because the threat is imminent and thus pursuing peaceful alternatives is not an option and 2) The response must be proportionate to the threat. (Elsea 2012: 6-8) 3 mean for our concept of citizenship in general, and how has this change altered the protections afforded to those members who hold citizenship? To answer these questions, it is first important to examine the protections, securities, and responsibilities afforded by a nation to those considered to be citizens. This project uses the story of the life and death of Anwar al-Awlaki as a means to explore these questions. Throughout the project, I will return to the al-Awlaki killing in order to examine the most extreme measure a government can take against one of its own citizens: execution. Of course, execution is not unfamiliar in the United States, with thirty-one states currently allowing the procedure. However, each state-sanctioned execution sentence is the result of an arrest, a trial, and a conviction based on evidence. In al-Awlaki's situation, none of these factors were present and there was no due process involved. Because of this, by using the al-Awlaki case as an anchor, I am able to delve into questions of citizenship, belonging,
Recommended publications
  • Combating Islamic Extremist Terrorism 1
    CGT 1/22/07 11:30 AM Page 1 Combating Islamic Extremist Terrorism 1 OVERALL GRADE D+ Al-Qaeda headquarters C+ Al-Qaeda affiliated groups C– Al-Qaeda seeded groups D+ Al-Qaeda inspired groups D Sympathizers D– 1 CGT 1/22/07 11:30 AM Page 2 2 COMBATING ISLAMIC EXTREMIST TERRORISM ive years after the September 11 attacks, is the United States win- ning or losing the global “war on terror”? Depending on the prism through which one views the conflict or the metrics used Fto gauge success, the answers to the question are starkly different. The fact that the American homeland has not suffered another attack since 9/11 certainly amounts to a major achievement. U.S. military and security forces have dealt al-Qaeda a severe blow, cap- turing or killing roughly three-quarters of its pre-9/11 leadership and denying the terrorist group uncontested sanctuary in Afghanistan. The United States and its allies have also thwarted numerous terror- ist plots around the world—most recently a plan by British Muslims to simultaneously blow up as many as ten jetliners bound for major American cities. Now adjust the prism. To date, al-Qaeda’s top leaders have sur- vived the superpower’s most punishing blows, adding to the near- mythical status they enjoy among Islamic extremists. The terrorism they inspire has continued apace in a deadly cadence of attacks, from Bali and Istanbul to Madrid, London, and Mumbai. Even discount- ing the violence in Iraq and Afghanistan, the tempo of terrorist attacks—the coin of the realm in the jihadi enterprise—is actually greater today than before 9/11.
    [Show full text]
  • Foreign Terrorist Organizations
    Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba
    [Show full text]
  • Filling Terrorism Gaps: Veos, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan
    PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 PNNL-25727 Abstract This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature. iii Acknowledgments The author would like to sincerely thank several individuals for their contributions to this research. My mentor, Chrissie Noonan, for her guidance and support throughout this process, Carolyn Cramer for her operational support and insight, Alex Stephan, Lead for the Special Programs and Scientific Studies Team at PNNL, George Muller for his support and direction, Hannah Trump for her substantial help with the appendices, and Dan Fortin, Sam Chatterjee, and Thomas Johansen for the constant discussions.
    [Show full text]
  • Identifying Enemies Among Us: Evolving Terrorist Threats and the Continuing Challenges of Domestic Intelligence Collection and Information Sharing
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation conference proceedings series. RAND conference proceedings present a collection of papers delivered at a conference or a summary of the conference. The material herein has been vetted by the conference attendees and both the introduction and the post-conference material have been re- viewed and approved for publication by the sponsoring research unit at RAND.
    [Show full text]
  • In Re: Terrorist Attacks on September 11, 2001
    Case 1:03-md-01570-GBD-SN Document 3671 Filed 08/01/17 Page 1 of 33 UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK ____________________________________ ) IN RE: TERRORIST ATTACKS ON ) Civil Action No. 03 MDL 1570 (GBD) SEPTEMBER 11, 2001 ) ECF Case ____________________________________ ) This document relates to: Ashton, et al. v. al Qaeda, et al., No. 02-cv-6977 Federal Insurance Co., et al. v. al Qaida, et al., No. 03-cv-6978 Thomas Burnett, Sr., et al. v. Al Baraka Inv. & Dev. Corp., et al., No. 03-cv-9849 Continental Casualty Co., et al. v. Al Qaeda, et al., No. 04-cv-5970 Cantor Fitzgerald Assocs., et al. v. Akida Inv. Co., et al. No. 04-cv-7065 Euro Brokers Inc., et al. v. Al Baraka Inv. & Dev. Corp., et al., No. 04-cv-7279 McCarthy, et al. v. Kingdom of Saudi Arabia, No. 16-cv-8884 Aguilar, et al. v. Kingdom of Saudi Arabia, et al., No. 16-cv-9663 Addesso, et al. v. Kingdom of Saudi Arabia, et al., No. 16-cv-9937 Hodges, et al. v. Kingdom of Saudi Arabia, et al., No. 17-cv-117 DeSimone v. Kingdom of Saudi Arabia, No. 17-cv-348 Aiken, et al v. Kingdom of Saudi Arabia, et al., No. 17-cv-450 The Underwriting Members of Lloyd’s Syndicate 53, et al. v. Kingdom of Saudi Arabia, et al., No. 17-cv-2129 The Charter Oak Fire Insurance Co., et al. v. Al Rajhi Bank, et al. No. 17-cv-02651 Abarca, et al.
    [Show full text]
  • Federal Bureau of Investigation Department of Homeland Security
    Federal Bureau of Investigation Department of Homeland Security Strategic Intelligence Assessment and Data on Domestic Terrorism Submitted to the Permanent Select Committee on Intelligence, the Committee on Homeland Security, and the Committee of the Judiciary of the United States House of Representatives, and the Select Committee on Intelligence, the Committee on Homeland Security and Governmental Affairs, and the Committee of the Judiciary of the United States Senate May 2021 Page 1 of 40 Table of Contents I. Overview of Reporting Requirement ............................................................................................. 2 II. Executive Summary ......................................................................................................................... 2 III. Introduction...................................................................................................................................... 2 IV. Strategic Intelligence Assessment ................................................................................................... 5 V. Discussion and Comparison of Investigative Activities ................................................................ 9 VI. FBI Data on Domestic Terrorism ................................................................................................. 19 VII. Recommendations .......................................................................................................................... 27 Appendix ....................................................................................................................................................
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • 9-11 and Terrorist Travel- Full
    AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States 9/11 AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States By Thomas R. Eldridge Susan Ginsburg Walter T. Hempel II Janice L. Kephart Kelly Moore and Joanne M. Accolla, Staff Assistant Alice Falk, Editor Note from the Executive Director The Commission staff organized its work around specialized studies, or monographs, prepared by each of the teams. We used some of the evolving draft material for these studies in preparing the seventeen staff statements delivered in conjunction with the Commission’s 2004 public hearings. We used more of this material in preparing draft sections of the Commission’s final report. Some of the specialized staff work, while not appropriate for inclusion in the report, nonetheless offered substantial information or analysis that was not well represented in the Commission’s report. In a few cases this supplemental work could be prepared to a publishable standard, either in an unclassified or classified form, before the Commission expired. This study is on immigration, border security and terrorist travel issues. It was prepared principally by Thomas Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice Kephart, and Kelly Moore, with assistance from Joanne Accolla, and editing assistance from Alice Falk. As in all staff studies, they often relied on work done by their colleagues. This is a study by Commission staff. While the Commissioners have been briefed on the work and have had the opportunity to review earlier drafts of some of this work, they have not approved this text and it does not necessarily reflect their views.
    [Show full text]
  • How Anwar Al-Awlaki Became the Face of Western Jihad
    As American as Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad Alexander Meleagrou-Hitchens Foreword by Lord Carlile of Berriew QC A policy report published by the International Centre for the Study of Radicalisation and Political Violence (ICSR) ABOUT ICSR The International Centre for the Study of Radicalisation and Political Violence (ICSR) is a unique partnership in which King’s College London, the University of Pennsylvania, the Interdisciplinary Center Herzliya (Israel), the Regional Center for Conflict Prevention Amman (Jordan) and Georgetown University are equal stakeholders. The aim and mission of ICSR is to bring together knowledge and leadership to counter the growth of radicalisation and political violence. For more information, please visit www.icsr.info. CONTACT DETAILS For questions, queries and additional copies of this report, please contact: ICSR King’s College London 138 –142 Strand London WC2R 1HH United Kingdom T. +44 (0)20 7848 2065 F. +44 (0)20 7848 2748 E. [email protected] Like all other ICSR publications, this report can be downloaded free of charge from the ICSR website at www.icsr.info. © ICSR 2011 AUTHOR’S NOTE This report contains many quotes from audio lectures as well as online forums and emails. All of these have been reproduced in their original syntax, including all spelling and grammatical errors. Contents Foreword 2 Letter of Support from START 3 Glossary of Terms 4 Executive Summary 6 Chapter 1 Introduction 9 Chapter 2 Methodology and Key Concepts 13 Social Movement Theory 13 Framing and
    [Show full text]
  • 20121211 IACHR Petition FINAL
    TO THE HONORABLE MEMBERS OF THE INTER-AMERICAN COMMISSION ON HUMAN RIGHTS, ORGANIZATION OF AMERICAN STATES PETITION ALLEGING VIOLATIONS OF THE HUMAN RIGHTS OF JOSE PADILLA and ESTELA LEBRON BY THE UNITED STATES OF AMERICA WITH A REQUEST FOR AN INVESTIGATION AND HEARING ON THE MERITS By the undersigned, appearing as counsel for petitioners UNDER THE PROVISIONS OF ARTICLE 23 OF THE RULES OF PROCEDURE OF THE INTER-AMERICAN COMMISSION ON HUMAN RIGHTS Steven M. Watt Human Rights Program American Civil Liberties Union 125 Broad Street, 18th Floor New York, NY, 10004 F/(212)-549-2654 P/(212)-519-7870 Hope Metcalf Ingrid Deborah Francois, Law Student Intern Sheng Li, Law Student Intern Alaina Varvaloucas, Law Student Intern Allard K. Lowenstein Human Rights Clinic Yale Law School 127 Wall St. New Haven, CT 06520 P/(203)-432-9404 Table of Contents INTRODUCTION ..................................................................................................................................................................... 1 FACTUAL AND PROCEDURAL BACKGROUND ................................................................................................ 3 I. Petitioner Estela Lebron ............................................................................................................................................. 3 II. Seizure, Detention, and Interrogation of Jose Padilla ................................................................................... 3 A. Initial Arrest and Detention Under the Material Witness Act .........................................................
    [Show full text]
  • The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West
    New America Foundation National Security Studies Program Policy Paper The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West Paul Cruickshank Second Edition July 2011; First Edition February 2010 Of the 32 “serious” jihadist terrorist plots against the West between 2004 and 2011, 53 percent had operational or training links to established jihadist groups in Pakistan and just 6 percent to Yemen. A decade after 9/11, despite growing concerns over Yemen, entry to join the fighting in Afghanistan, the presence of al Pakistan’s Federally Administered Tribal Areas (FATA) and Qaeda, and its sustained ability to train recruits and swaths of the country’s northwest arguably remain al Qaeda persuade them to launch attacks in the West, continue to ’s main safe haven, and the area from which it can hatch its make the FATA what President Obama called in 2009 “the most dangerous plots against the West. 1 Al Qaeda’s most dangerous place in the world.” 4 presence in these areas has long threatened international security. It was in Peshawar in Pakistan’s northwest that al U.S. officials have recently suggested that when it comes to Qaeda was founded in 1988, and ever since Pakistan’s the U.S. homeland, al Qaeda’s affiliate in Yemen – al Qaeda border region with Afghanistan has been a gateway for in the Arabian Peninsula (AQAP) – could now pose a recruits joining the terrorist network and its affiliates, and greater threat than “al Qaeda Central” in the tribal areas of an area in which its senior figures have felt comfortable Pakistan.
    [Show full text]
  • The New Insurgents: a Select Review of Recent Literature on Terrorism and Insurgency
    The New Insurgents: A Select Review of Recent Literature on Terrorism and Insurgency George Michael US Air Force Counterproliferation Center Maxwell Air Force Base, Alabama THE NEW INSURGENTS: A Select Review of Recent Literature on Terrorism and Insurgency by George Michael USAF Counterproliferation Center 325 Chennault Circle Maxwell Air Force Base, Alabama 36112-6427 March 2014 Disclaimer The opinions, conclusions, and recommendations expressed or implied in this publication are those of the author and do not necessarily reflect the views of the Air University, Air Force, or Department of Defense. ii Contents Chapter Page Disclaimer .............................................................................................. ii About the Author..................................................................................... v Introduction ........................................................................................... vii 1 Domestic Extremism and Terrorism in the United States ....................... 1 J.M. Berger, Jihad Joe: Americans Who Go to War in the Name of Islam ................................................................................................ 3 Catherine Herridge, The Next Wave: On the Hunt for Al Qaeda’s American Recruits ........................................................................... 8 Martin Durham, White Rage: The Extreme Right and American Politics ........................................................................................... 11 2 Jihadist Insurgent Strategy ....................................................................
    [Show full text]